Skip to content

DoS via failed authToken validation

Moderate
antobinary published GHSA-rgjp-3r74-g4cm Dec 15, 2022

Package

bbb-html5 (BigBlueButton)

Affected versions

<2.4.3

Patched versions

2.5-alpha-1, 2.4.3

Description

Impact

The attacker could make a Meteor call to validateAuthToken using a victim's userId and meetingId, and including an invalid authToken. This forced the victim to leave the conference, because the resulting verification failure was also observed and handled by the victim's client. The attacker had to be a participant in any meeting on the server.

Workarounds

No Workarounds

References

We refactored the authToken validation such that clients only handle answers to its own validation requests.

Patch in BigBlueButton 2.5-alpha-1 | #13601
patch in BigBlueButton 2.4.3 | #14295

For more information

If you have any questions or comments about this advisory:

Email us at security at bigbluebutton.org

Credits

We thank Nico Heitmann, Sven Hebrok, and Juraj Somorovsky from Paderborn University who examined the BigBlueButton code base and responsibly disclosed this vulnerability.

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE ID

CVE-2022-41960

Weaknesses

No CWEs